US20070154000A1 - Method and apparatus for forwarding incoming telecommunication calls according to receiver position - Google Patents

Method and apparatus for forwarding incoming telecommunication calls according to receiver position Download PDF

Info

Publication number
US20070154000A1
US20070154000A1 US11/532,920 US53292006A US2007154000A1 US 20070154000 A1 US20070154000 A1 US 20070154000A1 US 53292006 A US53292006 A US 53292006A US 2007154000 A1 US2007154000 A1 US 2007154000A1
Authority
US
United States
Prior art keywords
identifier
subscriber
telephone
endpoint
endpoints
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US11/532,920
Other versions
US8306207B2 (en
Inventor
Giuseppe Longobardi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LONGOBARDI, GIUSEPPE
Publication of US20070154000A1 publication Critical patent/US20070154000A1/en
Application granted granted Critical
Publication of US8306207B2 publication Critical patent/US8306207B2/en
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42229Personal communication services, i.e. services related to one subscriber independent of his terminal and/or location
    • H04M3/42263Personal communication services, i.e. services related to one subscriber independent of his terminal and/or location where the same subscriber uses different terminals, i.e. nomadism
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2242/00Special services or facilities
    • H04M2242/14Special services or facilities with services dependent on location
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2242/00Special services or facilities
    • H04M2242/30Determination of the location of a subscriber

Definitions

  • the present invention relates to the communication field. More specifically, the present invention relates to a method of forwarding a telecommunication call within a network. The invention further relates to a computer program for performing the method, and to a product embodying the program. Moreover, the invention also relates to a corresponding apparatus.
  • a network of telecommunication endpoints e.g. a plurality of telephones connected through a switchboard within one or more Company sites
  • a telephone number and a corresponding telephone apparatus is assigned to an employee
  • a telephone number assignee is away from his phone and would like an incoming call to be redirected to another phone. This can be a meeting room phone, a colleague's office phone or maybe a temporarily assigned office in a different location.
  • a method of managing telecommunication transactions in a telecommunication network including a plurality of endpoints connected to at least one common server, each endpoint being assigned to at least one of a plurality of subscribers, including, for each subscriber, the steps of: associating the subscriber to a portable detectable identifier; detecting the position of said identifier; selecting one of the plurality of endpoints according to the position of said identifier; forwarding an incoming communication request addressed to the subscriber to said selected endpoint.
  • a further aspect of the present invention provides a computer program for performing the above-described method.
  • a still further aspect of the invention provides a program product embodying this program.
  • Another aspect of the invention provides a corresponding apparatus for implementing the above method.
  • FIG. 1 is a schematic block diagram of a telephone system in which the method of the invention is applicable;
  • FIG. 2 shows the functional blocks of a generic computer of the system
  • FIG. 3 depicts the main components that can be used for practicing the method.
  • FIG. 4 show a diagram describing the flow of activities relating to an illustrative implementation of the method.
  • FIG. 1 a local network 100 of telephones with a System Management Server 101 , implementing the forwarding method of the present invention is depicted.
  • the system 100 includes multiple endpoints 103 , which are grouped into different sub network 105 .
  • the different subnetwork can be for example the local networks of different site locations of the same Company, which are all connected through a general network 107 to the centralized controlling System Management Server (containing e.g. a switchboard) 101 .
  • the endpoints 103 are normally telephone receivers connected to the centralized data processing system 101 and to one or more switchboards.
  • FIG. 1 describes one of the many possible telephone networks which could implement the present invention; e.g.
  • a generic computer of the system (workstation, local server, or system management server) is denoted with 150 .
  • the computer 150 is formed by several units that are connected in parallel to a system bus 153 .
  • one or more microprocessors ( ⁇ P) 156 control operation of the computer 150 ;
  • a RAM 159 is directly used as a working memory by the microprocessors 156 , and
  • a ROM 162 stores basic code for a bootstrap of the computer 150 .
  • Peripheral units are clustered around a local bus 165 (by means of respective interfaces).
  • a mass memory consists of a hard-disk 168 and a drive 171 for reading CD-ROMs 174 .
  • the computer 150 includes input devices 177 (for example, a keyboard and a mouse), and output devices 180 (for example, a monitor and a printer).
  • a Network Interface Card (NIC) 183 is used to connect the computer 150 to the network.
  • a bridge unit 186 interfaces the system bus 153 with the local bus 165 .
  • Each microprocessor 156 and the bridge unit 186 can operate as master agents requesting an access to the system bus 153 for transmitting information.
  • An arbiter 189 manages the granting of the access with mutual exclusion to the system bus 153 .
  • the system has a different topology, or it is based on other networks.
  • the computers have a different structure, include equivalent units, or consist of other data processing entities (such as PDAs, mobile phones, and the like).
  • the solution of the invention is also suitable to be used in a system wherein the control of the workstations is decentralized.
  • the main components that can be used to practice the method of a preferred embodiment of the invention are denoted as a whole with 300 .
  • the information is typically stored on the hard-disks of the different computers and loaded (at least partially) into the corresponding working memories when the programs are running.
  • the plurality of telephone receivers 103 are distributed within the offices of one or more sites of an entity (e.g. a private Company or Corporation or a Public Body) all connected together by means of a switchboard system 301 .
  • a corresponding plurality of detectors 303 are positioned in proximity of the telephone receivers 103 (or at least to some of them), so that the presence of e.g.
  • RFID Radio Frequency Identification
  • bar code that operate at a distance. It is a method of storing and retrieving data without the need of proximity of a reader.
  • RFID tags are very small and can be easily incorporated in a card (in our case e.g. a Company badge) and carried by a user. They contain an antenna to receive and respond to an RFID transceiver. They can be passive or active. The advantage of the passive RFID is that they don't need power (i.e. a battery) and can therefore be smaller than active ones. For the purpose of the present invention a passive RFID tag is believed to be the best choice. Other technical solution could be used instead, even if at the moment the RFID technology seems to be the most convenient, effective and economically advantageous for a similar solution.
  • Such presence of the RFID tag 305 (and consequently the presence of the person carrying the tag to whom a telephone number or extension XY is assigned) next to a target telephone receiver 103 will then be communicated to a Central Processing Server 307 .
  • the Central Processing Server 307 will cause the Central Switch Board 301 to switch any incoming call, addressed to the number XY, to said target telephone receiver.
  • An RFID tag can be assigned to each telephone number, so that the incoming calls addressed to a number XY will be redirected to the telephone receiver next to the corresponding RFID tag (and supposedly to the assignee of the tag and the number XY).
  • An additional optional component of the system is a Command Interface 309 which allows the interaction with the Central Processing Server 307 and the Central Switch Board 301 .
  • This command interface can be implemented through simple command line interface (CLI), dialog panels simple or graphical (GUI), WEB based page or just a set of switches and a simple led display. Many different implementations of such interface are possible, the above system does not depend on how this interface is implemented and which technology it uses.
  • As part of the administrative tasks accomplished by using this interface are the association between the phone numbers, the owners of that phone numbers and the unique corresponding RFID.
  • This info is stored in a database 311 which can be also updated through the command interface. For ex. to add new users, or to delete existing ones (e.g. a retired employee) or to update the RFID code (e.g. a lost tag).
  • Additional settings can be the ability to centrally enable or deny the possibility of using the RFID feature, to a single user or to a set or group of users; the creation of a “black list” (avoiding the function enabling in a conference room, or only enabling the switch for an instructor and not for the class attendees), or the definition of a specific set of RFIDs that can only switch between themselves
  • the database 311 contains all the information necessary to create the association of a number and the current position of the corresponding RFID.
  • the content of the DB 311 is modified according to the method as described below or can be modified by the system administrator as mentioned above.
  • the database can be internal or external to the switch board system, can be local or remote (completely or partially), and its implementation is not relevant to the present embodiment.
  • It can be a physical DB running on a PC, on a server, or it can be defined on a set of memory chips, or it can be defined on a EPROM, or mass storage devices (CD, DVD, TAPE, etc. . . . ).
  • In the DB can also be stored info like the privileges and the operations allowed to each phone network user, the defaults used, any special class, the billing department, and so on.
  • an RFID detector 303 monitors the surrounding areas of a plurality of receivers 103 (e.g. all the telephones in a room). In such case it is reasonable to select one of the phones as the target receiver and possibly considering a back up in case the first receiver is busy. Another possible alternative is to embed the RFID detector in the telephone receiver.
  • FIG. 4 the logic flow of a call forwarding method according to an embodiment of the invention is represented.
  • FIG. 4 is referred to a single detector/receiver set and describes the method of detecting the presence of a new temporary user next to the receiver and of communicating such temporary presence to the Central Processing Server 307 so that if and when an incoming call arrives, the call can be forwarded automatically to the phone receiver (or to one of the phone receivers) next to the user to whom the call is addressed.
  • the method begins at the black start circle 401 .
  • the system verify if the detectors has sensed the presence of an RFID tag within a predetermined distance from a receiver.
  • step 405 the database 311 is queried to see if the detected RFID tag corresponds to number assigned to that receiver (step 407 ). If the answer is yes, the system checks if the number is currently deviated to a different phone number ( 411 ), in which case the database 311 is updated (step 413 ) and the deviation is cleared (step 415 ). If the detected RFID tag results to be different from the telephone assignee, a test is done to verify if such presence can be considered a relatively permanent one, i.e. if the user carrying the tag remains near the phone (e.g.
  • step 409 the database is updated and the number of the detected RFID tag is deviated to this telephone receiver ( 419 , 421 and 423 ) unless it is determined that the number was deviated already to the same phone (step 417 ).
  • the method according to the present invention is also suitable to be carried out with a hardware structure (for example, integrated in a chip of semiconductor material), or with a combination of software and hardware.

Abstract

A method and a corresponding apparatus for forwarding incoming calls according to the current position of the intended receiver. The position is detected by means of RFID tag and corresponding detectors. A plurality of telephone receivers are distributed within the offices of one or more sites of an entity (e.g. a private Company or Corporation or a Public Body) all connected together by means of a switchboard system. A corresponding plurality of detectors are positioned in proximity of the telephone receivers, so that the presence of an RFID tag is detected whenever it comes within a predetermined distance. Such presence of the RFID tag (and consequently the presence of the person carrying the tag to whom a telephone number is assigned) next to a target telephone receiver will then be communicated to a Central Switchboard.

Description

    TECHNICAL FIELD
  • The present invention relates to the communication field. More specifically, the present invention relates to a method of forwarding a telecommunication call within a network. The invention further relates to a computer program for performing the method, and to a product embodying the program. Moreover, the invention also relates to a corresponding apparatus.
  • BACKGROUND ART
  • In a network of telecommunication endpoints (e.g. a plurality of telephones connected through a switchboard within one or more Company sites) there is often the need of forwarding a call to a different location. As an example when a telephone number and a corresponding telephone apparatus is assigned to an employee, it is normally possible for the employee to select a forward option in order to automatically switch the call to another telephone or to an answering machine. It can happen that a telephone number assignee is away from his phone and would like an incoming call to be redirected to another phone. This can be a meeting room phone, a colleague's office phone or maybe a temporarily assigned office in a different location. If the employee knows in advance the target telephone number it is normally possible to preset his assigned telephone so that an incoming call will be redirected to such target number. Alternatively the same action can be done from the target phone. Both these solutions have some drawbacks, because an active action must be done by the receiver and, in the first case, the destination must be known in advance.
  • It is an object of the present invention to provide a method and a system which alleviates the above drawbacks.
  • SUMMARY OF THE INVENTION
  • According to the present invention we provide a method of managing telecommunication transactions, in a telecommunication network including a plurality of endpoints connected to at least one common server, each endpoint being assigned to at least one of a plurality of subscribers, including, for each subscriber, the steps of: associating the subscriber to a portable detectable identifier; detecting the position of said identifier; selecting one of the plurality of endpoints according to the position of said identifier; forwarding an incoming communication request addressed to the subscriber to said selected endpoint.
  • A further aspect of the present invention provides a computer program for performing the above-described method.
  • A still further aspect of the invention provides a program product embodying this program.
  • Moreover, another aspect of the invention provides a corresponding apparatus for implementing the above method.
  • The novel features believed to be characteristic of this invention are set forth in the appended claims. The invention itself, however, as well as these and other related objects and advantages thereof, will be best understood by reference to the following detailed description to be read in conjunction with the accompanying drawings.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a schematic block diagram of a telephone system in which the method of the invention is applicable;
  • FIG. 2 shows the functional blocks of a generic computer of the system;
  • FIG. 3 depicts the main components that can be used for practicing the method; and
  • FIG. 4 show a diagram describing the flow of activities relating to an illustrative implementation of the method.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT(S)
  • With reference in particular to FIG. 1, a local network 100 of telephones with a System Management Server 101, implementing the forwarding method of the present invention is depicted. The system 100 includes multiple endpoints 103, which are grouped into different sub network 105. The different subnetwork can be for example the local networks of different site locations of the same Company, which are all connected through a general network 107 to the centralized controlling System Management Server (containing e.g. a switchboard) 101. The endpoints 103 are normally telephone receivers connected to the centralized data processing system 101 and to one or more switchboards. FIG. 1 describes one of the many possible telephone networks which could implement the present invention; e.g. it is possible that all the telephone receivers are connected through a single network to a single switchboard, or there could be several levels of switchboards connected one each other through several subnetworks. The present example describes a telephone network, however a similar system could be implemented with other kinds of endpoints, e.g. instant messenger terminals.
  • As shown in FIG. 2, a generic computer of the system (workstation, local server, or system management server) is denoted with 150. The computer 150 is formed by several units that are connected in parallel to a system bus 153. In detail, one or more microprocessors (μP) 156 control operation of the computer 150; a RAM 159 is directly used as a working memory by the microprocessors 156, and a ROM 162 stores basic code for a bootstrap of the computer 150. Peripheral units are clustered around a local bus 165 (by means of respective interfaces). Particularly, a mass memory consists of a hard-disk 168 and a drive 171 for reading CD-ROMs 174. Moreover, the computer 150 includes input devices 177 (for example, a keyboard and a mouse), and output devices 180 (for example, a monitor and a printer). A Network Interface Card (NIC) 183 is used to connect the computer 150 to the network. A bridge unit 186 interfaces the system bus 153 with the local bus 165. Each microprocessor 156 and the bridge unit 186 can operate as master agents requesting an access to the system bus 153 for transmitting information. An arbiter 189 manages the granting of the access with mutual exclusion to the system bus 153.
  • Similar considerations apply if the system has a different topology, or it is based on other networks. Alternatively, the computers have a different structure, include equivalent units, or consist of other data processing entities (such as PDAs, mobile phones, and the like). In any case, the solution of the invention is also suitable to be used in a system wherein the control of the workstations is decentralized.
  • Considering now FIG. 3, the main components that can be used to practice the method of a preferred embodiment of the invention are denoted as a whole with 300. The information (programs and data) is typically stored on the hard-disks of the different computers and loaded (at least partially) into the corresponding working memories when the programs are running. In an embodiment of the present invention, the plurality of telephone receivers 103 are distributed within the offices of one or more sites of an entity (e.g. a private Company or Corporation or a Public Body) all connected together by means of a switchboard system 301. A corresponding plurality of detectors 303 are positioned in proximity of the telephone receivers 103 (or at least to some of them), so that the presence of e.g. an RFID tag is detected whenever it comes within a predetermined distance. RFID (Radio Frequency Identification) is normally used as a sort of “bar code” that operate at a distance. It is a method of storing and retrieving data without the need of proximity of a reader. RFID tags are very small and can be easily incorporated in a card (in our case e.g. a Company badge) and carried by a user. They contain an antenna to receive and respond to an RFID transceiver. They can be passive or active. The advantage of the passive RFID is that they don't need power (i.e. a battery) and can therefore be smaller than active ones. For the purpose of the present invention a passive RFID tag is believed to be the best choice. Other technical solution could be used instead, even if at the moment the RFID technology seems to be the most convenient, effective and economically advantageous for a similar solution.
  • Such presence of the RFID tag 305 (and consequently the presence of the person carrying the tag to whom a telephone number or extension XY is assigned) next to a target telephone receiver 103 will then be communicated to a Central Processing Server 307. The Central Processing Server 307 will cause the Central Switch Board 301 to switch any incoming call, addressed to the number XY, to said target telephone receiver. An RFID tag can be assigned to each telephone number, so that the incoming calls addressed to a number XY will be redirected to the telephone receiver next to the corresponding RFID tag (and supposedly to the assignee of the tag and the number XY). An additional optional component of the system is a Command Interface 309 which allows the interaction with the Central Processing Server 307 and the Central Switch Board 301. It may be used for the central administration of the functions described above. This command interface can be implemented through simple command line interface (CLI), dialog panels simple or graphical (GUI), WEB based page or just a set of switches and a simple led display. Many different implementations of such interface are possible, the above system does not depend on how this interface is implemented and which technology it uses. As part of the administrative tasks accomplished by using this interface are the association between the phone numbers, the owners of that phone numbers and the unique corresponding RFID. This info is stored in a database 311 which can be also updated through the command interface. For ex. to add new users, or to delete existing ones (e.g. a retired employee) or to update the RFID code (e.g. a lost tag). Additional settings can be the ability to centrally enable or deny the possibility of using the RFID feature, to a single user or to a set or group of users; the creation of a “black list” (avoiding the function enabling in a conference room, or only enabling the switch for an instructor and not for the class attendees), or the definition of a specific set of RFIDs that can only switch between themselves The database 311 contains all the information necessary to create the association of a number and the current position of the corresponding RFID. The content of the DB 311 is modified according to the method as described below or can be modified by the system administrator as mentioned above. The database can be internal or external to the switch board system, can be local or remote (completely or partially), and its implementation is not relevant to the present embodiment. It can be a physical DB running on a PC, on a server, or it can be defined on a set of memory chips, or it can be defined on a EPROM, or mass storage devices (CD, DVD, TAPE, etc. . . . ). In the DB can also be stored info like the privileges and the operations allowed to each phone network user, the defaults used, any special class, the billing department, and so on.
  • Alternative implementations could be used in place of the structure described above, e.g. it is reasonable that an RFID detector 303 monitors the surrounding areas of a plurality of receivers 103 (e.g. all the telephones in a room). In such case it is reasonable to select one of the phones as the target receiver and possibly considering a back up in case the first receiver is busy. Another possible alternative is to embed the RFID detector in the telephone receiver.
  • Considering now FIG. 4, the logic flow of a call forwarding method according to an embodiment of the invention is represented. In particular FIG. 4 is referred to a single detector/receiver set and describes the method of detecting the presence of a new temporary user next to the receiver and of communicating such temporary presence to the Central Processing Server 307 so that if and when an incoming call arrives, the call can be forwarded automatically to the phone receiver (or to one of the phone receivers) next to the user to whom the call is addressed. The method begins at the black start circle 401. Continuing to block 403 the system verify if the detectors has sensed the presence of an RFID tag within a predetermined distance from a receiver. Than (step 405) the database 311 is queried to see if the detected RFID tag corresponds to number assigned to that receiver (step 407). If the answer is yes, the system checks if the number is currently deviated to a different phone number (411), in which case the database 311 is updated (step 413) and the deviation is cleared (step 415). If the detected RFID tag results to be different from the telephone assignee, a test is done to verify if such presence can be considered a relatively permanent one, i.e. if the user carrying the tag remains near the phone (e.g. in the room) more than a predetermined period of time (step 409), in such case the database is updated and the number of the detected RFID tag is deviated to this telephone receiver (419, 421 and 423) unless it is determined that the number was deviated already to the same phone (step 417). Going back to the test 403, as a possible additional feature, if no RFID is detected and this absence lasts for more than a predetermined period of time (425) it is assumed that the user is away from his phone and the database is updated accordingly (427), so that, when a calls arrives can be automatically transferred to an answering machine or to a switchboard or a secretary, unless, of course the presence of a corresponding tag is detected somewhere else, in which case the call is forwarded accordingly. It is clear to those skilled in the art that the present method and step sequence is just one example of the many possible implementations. E.g., as mentioned above a different system for communicating and detecting the presence of a user could be used instead of the RFID techniques. Another possible equivalent solution would be to look for the position of the RFID tag corresponding to a specific number only when a call addressed to such specific number cannot be sent to the assigned telephone receiver because the absence of the user has been reported.
  • Similar considerations apply if the programs and data are structured in a different manner, if other modules or functions are provided, or if the information is stored in equivalent memory structures.
  • Similar considerations apply if the method includes equivalent or additional steps.
  • Although the invention has been described above with a certain degree of particularity with reference to preferred embodiment(s) thereof, it should be understood that various changes in the form and details as well as other embodiments are possible. Particularly, it is expressly intended that all combinations of those elements and/or method steps that substantially perform the same function in the same way to achieve the same results are within the scope of the invention.
  • Moreover, it will be apparent to those skilled in the art that the additional features providing further advantages are not essential for carrying out the invention, and may be omitted or replaced with different features.
  • In any case, the method according to the present invention is also suitable to be carried out with a hardware structure (for example, integrated in a chip of semiconductor material), or with a combination of software and hardware.
  • Naturally, in order to satisfy local and specific requirements, a person skilled in the art may apply to the solution described above many modifications and alterations all of which, however, are included within the scope of protection of the invention as defined by the following claims.

Claims (10)

1. A method of managing telecommunication transactions, in a telecommunication network including a plurality of endpoints connected to at least one common server, each endpoint being assigned to at least one of a plurality of subscribers, including, for each subscriber, the steps of:
associating the subscriber to a portable detectable identifier;
detecting the position of said identifier;
selecting at least one of the plurality of endpoints according to the position of said identifier;
forwarding an incoming communication request addressed to the subscriber to said at least one selected endpoint.
2. The method of claim 1, wherein the identifier is a transponder.
3. The method of claim 2, wherein the transponder is an RFID tag and the position of said tag is detected by means of RFID transceiver.
4. The method of claim 1 wherein the endpoints include a telephone receiver.
5. The method of claim 4 wherein the common server includes a telephone switchboard.
6. The method of claim 4 wherein the telecommunication network is a Company telephone network extending within at least one Company site.
7. The method of claim 1 wherein the endpoints include an instant messaging terminal.
8. The method of claim 1 wherein the selection of the endpoint is done so that the distance from the identifier is minimized.
9. A computer program in a computer readable medium for performing a method of managing telecommunications transactions when the computer program is executed on a data processing system the method comprising the steps of:
associating a subscriber to a portable detectable identifier;
detecting a position of said identifier;
selecting at least one of a plurality of endpoints according to the position of said identifier;
forwarding an incoming communication request addressed to the subscriber to said at least one selected endpoint.
10. A system for Comprising:
common server, each endpoint being assigned to at least one of a plurality of subscribers, including, for each subscriber;
means for associating the subscriber to a portable detectable identifier;
means for detecting the position of said identifier;
means for selecting at least one of the plurality of endpoints according to the position of said identifier;
means for means for forwarding an incoming communication request addressed to the subscriber to said at least one selected endpoint.
US11/532,920 2005-09-21 2006-09-19 Method and apparatus for forwarding incoming telecommunication calls according to receiver position Expired - Fee Related US8306207B2 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP05108722.9 2005-09-21
EP05108722 2005-09-21
EP05108722 2005-09-21

Publications (2)

Publication Number Publication Date
US20070154000A1 true US20070154000A1 (en) 2007-07-05
US8306207B2 US8306207B2 (en) 2012-11-06

Family

ID=38224427

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/532,920 Expired - Fee Related US8306207B2 (en) 2005-09-21 2006-09-19 Method and apparatus for forwarding incoming telecommunication calls according to receiver position

Country Status (1)

Country Link
US (1) US8306207B2 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9473888B1 (en) 2015-05-26 2016-10-18 International Business Machines Corporation Location-based communication with mobile devices

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5414759A (en) * 1990-03-20 1995-05-09 Fujitsu Limited Automatic personal search telephone system
US20040086100A1 (en) * 2002-04-02 2004-05-06 Worldcom, Inc. Call completion via instant communications client
US20050063528A1 (en) * 2003-09-23 2005-03-24 Sbc Knowledge Ventures, L.P. Location based call routing for call answering services
US20060077957A1 (en) * 2004-10-08 2006-04-13 Umamaheswar Reddy Call handoff between subscriber's multiple devices associated with multiple networks
US20060093117A1 (en) * 2004-11-04 2006-05-04 International Business Machines Corporation Routing telecommunications to a user in dependence upon device-based routing preferences
US20060187046A1 (en) * 2005-02-22 2006-08-24 Kramer Bradley A System and method for killing a RFID tag
US7120238B1 (en) * 2001-07-12 2006-10-10 8X8, Inc. Sensor-controlled telephone system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5414759A (en) * 1990-03-20 1995-05-09 Fujitsu Limited Automatic personal search telephone system
US7120238B1 (en) * 2001-07-12 2006-10-10 8X8, Inc. Sensor-controlled telephone system
US20040086100A1 (en) * 2002-04-02 2004-05-06 Worldcom, Inc. Call completion via instant communications client
US20050063528A1 (en) * 2003-09-23 2005-03-24 Sbc Knowledge Ventures, L.P. Location based call routing for call answering services
US20060077957A1 (en) * 2004-10-08 2006-04-13 Umamaheswar Reddy Call handoff between subscriber's multiple devices associated with multiple networks
US20060093117A1 (en) * 2004-11-04 2006-05-04 International Business Machines Corporation Routing telecommunications to a user in dependence upon device-based routing preferences
US20060187046A1 (en) * 2005-02-22 2006-08-24 Kramer Bradley A System and method for killing a RFID tag

Also Published As

Publication number Publication date
US8306207B2 (en) 2012-11-06

Similar Documents

Publication Publication Date Title
CN103404088B (en) Voice-over-ip ('voip') systems, components and methods for providing enhanced location information to emergency responders to respond to emergency calls
CN100468441C (en) Integrated, automated real-time location positioning asset management system
US7154409B2 (en) System and method for importing location information and policies as part of a rich presence environment
TWI806813B (en) Communication method and server
US5784451A (en) Virtual telephony data message system and process
DK0988610T3 (en) Telecommunication service workstation with integrated presentation of simultaneous interactions with multiple terminal emulation, hypermedia and telephone systems
CN104113466A (en) Harassing phone call identification method, client, server and system
CN109117659A (en) A kind of big data security isolation management system under multi-tenant mode
US6847639B2 (en) Managing feature interaction among a plurality of independent feature servers in telecommunications servers
CN102412998A (en) Operation service system and maintenance method and device thereof
KR100375152B1 (en) Method for the management of an automatic branch exchange with the creation of a table of users, and corresponding automatic branch exchange
CN101207662A (en) Thin client system and communication apparatus
US8306207B2 (en) Method and apparatus for forwarding incoming telecommunication calls according to receiver position
US20050105709A1 (en) Method and system for intelligent routing of telephone calls
CN102456038A (en) Instant reminding method based on thread monitoring technology
US7783313B2 (en) System and architecture for the handling of shared and personal preferences in call processing and presence for IP telephony and collaborative applications
CA2464201C (en) Method and apparatus for determining telecommunication number based on presence
CN100375442C (en) Communication network management and processing system and method
US7356129B1 (en) Apparatus for locating a station initiating transmission of an emergency message in a network having multiple transmission sources
CN106330831A (en) User management method and system of government and enterprise network, service server and communication core network
US7218927B2 (en) SLEE service convergence and routing
CN102333147A (en) Method for exchanging personal related information based on ID (identification) information and verification information
CN114978855B (en) Cross-domain data exchange method based on multi-level organization
CN1893484B (en) Relay-resource control method and system used for virtual switchboard business
CN103916380B (en) The method for realizing graded dispatching is encapsulated by operation layer

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LONGOBARDI, GIUSEPPE;REEL/FRAME:018270/0294

Effective date: 20060907

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20201106